Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,290 --> 00:00:05,572
Hello guys, welcome to this course of recon
for bug bounty hunters and penetration testers.
2
00:00:06,112 --> 00:00:12,955
So this course is fully focused on like reconnaissance
on reconnaissance for bug bounty hunters and
3
00:00:12,995 --> 00:00:19,138
penetration testers. So let's hunt for bug not
for bounty. If you find bugs then automatically
4
00:00:19,178 --> 00:00:27,606
you will get bounty. So don't run behind bounty
run behind bugs. Okay. So I am Vivek Pandit,
5
00:00:27,686 --> 00:00:32,889
a bug bounty hunter, blogger, website developer
and ethical hacker. I have founded more than
6
00:00:32,949 --> 00:00:39,973
500 bugs in various websites at HackerOne, Bugcrowd
and some private programs. I have founded most
7
00:00:40,033 --> 00:00:45,256
of the bugs in the recon phase. That's why I
am bringing this course to share my skills
8
00:00:45,296 --> 00:00:51,860
with you all so you can also find more bugs.
So I invite you to take this course to upscale
9
00:00:51,880 --> 00:00:58,694
your career in cybersecurity. bug bounty hunting
and penetration testing. Okay, so let's get
10
00:00:58,734 --> 00:01:01,241
a quick overview of course curriculum.
11
00:01:07,218 --> 00:01:13,263
So we will start with the introduction that
we are doing right now and then we will go
12
00:01:13,303 --> 00:01:18,847
to subdomain enumeration from tools and then
we are going to enumerate subdomains from websites
13
00:01:19,428 --> 00:01:25,753
and after that after enumeration of that subdomains
we are going to filter that subdomains like
14
00:01:27,154 --> 00:01:32,399
we are going to filter only live domains. Okay,
that the domains that are giving response.
15
00:01:32,419 --> 00:01:39,532
Okay, so in the fifth section, we are going
to extract. URLs from internet from for a specific
16
00:01:39,572 --> 00:01:46,098
website and then in the section 6 we are going
to find parameters from that URL or use some
17
00:01:46,158 --> 00:01:54,785
tools for that and we are also going to like
brute force for parameters. So we will get
18
00:01:55,566 --> 00:02:01,550
some parameters that are not on internet also.
Then after that we are going to sort those
19
00:02:01,671 --> 00:02:08,807
URLs and then we are going to use a tool. for
automation for replacing parameters with payloads.
20
00:02:08,887 --> 00:02:16,510
Okay, so it can like replace 1000 of like parameters
with payloads. Okay. And then after that, we
21
00:02:16,530 --> 00:02:24,033
are going to footprint a website using many
different techniques and tools. So in the 11th
22
00:02:24,073 --> 00:02:28,835
section, we are going to learn how to use browser
add ons for recon and in the 12th section,
23
00:02:29,235 --> 00:02:35,678
we are going to learn how to identify the WAF
means web application And then we are also
24
00:02:35,698 --> 00:02:41,542
going to look for subdomain takeover vulnerabilities.
And we are in the 14th section, we are going
25
00:02:41,602 --> 00:02:49,348
to like increase our scope of bug bounty by
doing fuzzing or content discovery. In the
26
00:02:49,388 --> 00:02:56,333
15th section, we are going to put do a port
scan and the 16th section, we are going to
27
00:02:56,393 --> 00:03:03,886
do fast port scanning. And in the 17th section,
we are going to visually record for. vulnerabilities
28
00:03:03,926 --> 00:03:11,708
in websites and this is the 18 section. It is
the most important section according to me
29
00:03:11,868 --> 00:03:17,090
because Google dorking is a very critical part
of any reconnaissance process. So I have explained
30
00:03:17,250 --> 00:03:23,711
everything about Google dorking every like every
single thing. Okay. And in the 19 section,
31
00:03:23,731 --> 00:03:29,453
we are going to implement our theory into practical
and find various vulnerabilities in various
32
00:03:29,493 --> 00:03:35,345
websites. And then We are going to like I'm
going to give you some tips like three tips
33
00:03:35,925 --> 00:03:45,974
on finding like advanced Google darking and
then we are going to like do a full class on
34
00:03:46,054 --> 00:03:52,139
showdown darking and in the twenty third section
we are going to like use that knowledge and
35
00:03:52,660 --> 00:03:59,205
dark like you showdown darking in practically
and in the twenty third section we are going
36
00:03:59,265 --> 00:04:05,105
to. you should on in our command line or in
our terminal. Okay. And in the 24th section,
37
00:04:05,165 --> 00:04:11,868
we are going to use github darking and find
sensitive information for a specific website.
38
00:04:11,968 --> 00:04:18,232
Okay. And in the 25th section, I'm going to
show you like some advanced vulnerability scanners
39
00:04:18,252 --> 00:04:23,895
that are used by bounty hunters and penetration
testers for finding vulnerabilities in websites.
40
00:04:24,035 --> 00:04:30,798
Okay. In the 26th section, I'm going to show
you. how to use Metasploit framework in our
41
00:04:30,878 --> 00:04:37,880
recon process. In the 27th section, I'm going
to show you how to enumerate version of port
42
00:04:38,360 --> 00:04:45,562
using like Metasploit and in the 26th and 28th
section, I have shared like 1000 of payloads
43
00:04:46,162 --> 00:04:53,344
that I have used like for finding so many bugs.
Okay. And I will also share my own personal
44
00:04:54,125 --> 00:05:02,477
folder where I have stored all the like payloads.
Okay. And in 29 section, I am going to like
45
00:05:02,637 --> 00:05:09,501
create four tools for our recon process. And
I will also teach you how you can also create
46
00:05:09,541 --> 00:05:17,387
your own tools using self scripting. Okay. And
this is a very like good part of this full
47
00:05:17,427 --> 00:05:25,778
course. And it is a it is the 29 section. And
here you will clear all the concepts of bug
48
00:05:25,798 --> 00:05:30,603
bounty hunting and penetration testing. And
in the 30th section, I'm going to give you
49
00:05:30,643 --> 00:05:41,576
a bonus like bonus tip. Okay, so let's meet
on the course and like let's go to the course
50
00:05:41,596 --> 00:05:42,297
curriculum. Okay.
6183
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.